AMX NXA-ENET8-POE User manual

  • Hello! I am an AI chatbot trained to assist you with the AMX NXA-ENET8-POE User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
INSTRUCTION MANUAL
NXA-ENET8-POE+
GIGABIT POE ETHERNET SWITCH
IMPORTANT SAFETY INSTRUCTIONS
COPYRIGHT NOTICE
AMX© 2016, all rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of AMX. Copyright protection claimed
extends to AMX hardware and software and includes all forms and matters copyrightable material and information now allowed by statutory or judicial
law or herein after granted, including without limitation, material generated from the software programs which are displayed on the screen such as
icons, screen display looks, etc. Reproduction or disassembly of embodied computer programs or algorithms is expressly prohibited.
LIABILITY NOTICE
No patent liability is assumed with respect to the use of information contained herein. While every precaution has been taken in the preparation of this
publication, AMX assumes no responsibility for error or omissions. No liability is assumed for damages resulting from the use of the information
contained herein. Further, this publication and features described herein are subject to change without notice.
AMX WARRANTY AND RETURN POLICY
The AMX Warranty and Return Policy and related documents can be viewed/downloaded at www.amx.com.
1. READ these instructions.
2. KEEP these instructions.
3. HEED all warnings.
4. FOLLOW all instructions.
5. DO NOT use this apparatus near water.
6. CLEAN ONLY with dry cloth.
7. DO NOT block any ventilation openings. Install in accordance with the manufacturer's instructions.
8. DO NOT install near any heat sources such as radiators, heat registers, stoves, or other apparatus (including amplifiers) that
produce heat.
9. DO NOT defeat the safety purpose of the polarized or grounding type plug. A polarized plug has two blades with one wider than the
other. A grounding type plug has two blades and a third grounding prong. The wider blade or the third prong are provided for your
safety. If the provided plug does not fit into your outlet, consult an electrician for replacement of the obsolete outlet.
10. PROTECT the power cord from being walked on or pinched, particularly at plugs, convenience receptacles, and the point where
they exit from the apparatus.
11. ONLY USE attachments/accessories specified by the manufacturer.
12. USE ONLY with a cart, stand, tripod, bracket, or table specified by the manufacturer, or sold with the apparatus. When a cart is
used, use caution when moving the cart/apparatus combination to avoid injury from tip-over.
13. UNPLUG this apparatus during lightning storms or when unused for long periods of time.
14. REFER all servicing to qualified service personnel. Servicing is required when the apparatus has been damaged in any way, such as
power-supply cord or plug is damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus has been
exposed to rain or moisture, does not operate normally, or has been dropped.
15. DO NOT expose this apparatus to dripping or splashing and ensure that no objects filled with liquids, such as vases, are placed on
the apparatus.
16. To completely disconnect this apparatus from the AC Mains, disconnect the power supply cord plug from the AC receptacle.
17. Where the mains plug or an appliance coupler is used as the disconnect device, the disconnect device shall remain readily operable.
18. DO NOT overload wall outlets or extension cords beyond their rated capacity as this can cause electric shock or fire.
The exclamation point, within an equilateral triangle, is intended to alert the user to the presence of important operating and maintenance
(servicing) instructions in the literature accompanying the product.
The lightning flash with arrowhead symbol within an equilateral triangle is intended to alert the user to the presence of uninsulated "dangerous
voltage" within the product's enclosure that may be of sufficient magnitude to constitute a risk of electrical shock to persons.
ESD Warning: The icon to the left indicates text regarding potential danger associated with the discharge of static electricity from an outside
source (such as human hands) into an integrated circuit, often resulting in damage to the circuit.
WARNING: To reduce the risk of fire or electrical shock, do not expose this apparatus to rain or moisture.
WARNING: No naked flame sources - such as lighted candles - should be placed on the product.
WARNING: Equipment shall be connected to a MAINS socket outlet with a protective earthing connection.
WARNING: The bottom of the enclosure is a hot surface. Do not touch!
3
Instruction Manual - NXA-ENET8-POE+
ESD WARNING
WARNING: This product is intended to be operated ONLY from the voltages listed on the back panel or the recommended, or
included, power supply of the product. Operation from other voltages other than those indicated may cause irreversible
damage to the product and void the products warranty. The use of AC Plug Adapters is cautioned because it can allow the
product to be plugged into voltages in which the product was not designed to operate. If the product is equipped with a
detachable power cord, use only the type provided with your product or by your local distributor and/or retailer. If you are
unsure of the correct operational voltage, please contact your local distributor and/or retailer.
RACK MOUNTING
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the operating ambient temperature of the
rack environment may be greater than room ambient. Therefore, consideration should be given to installing the equipment in
an environment compatible with the maximum ambient temperature (Tma) specified by the manufacturer.
B) Reduced Air Flow - Installation of the equipment in a rack should be such that the amount of air flow required for safe
operation of the equipment is not compromised.
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a hazardous condition is not achieved due
to uneven mechanical loading.
D) Circuit Overloading - Consideration should be given to the connection of the equipment to the supply circuit and the effect
that overloading of the circuits might have on overcurrent protection and supply wiring. Appropriate consideration of
equipment nameplate ratings should be used when addressing this concern.
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given
to supply connections other than direct connections to the branch circuit (e.g. use of power strips)."
FCC AND CANADA EMC COMPLIANCE INFORMATION:
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference received, including
interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of
the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if it is not
installed and used in accordance with the instruction manual, it may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required
to correct the interference at his own expense.
CAN ICES-3 (A)/NMB-3(A)
To avoid ESD (Electrostatic Discharge) damage to sensitive components, make sure you are properly grounded before
touching any internal materials.
When working with any equipment manufactured with electronic devices, proper ESD grounding procedures must be
followed to make sure people, products, and tools are as free of static charges as possible. Grounding straps, conductive
smocks, and conductive work mats are specifically designed for this purpose. These items should not be manufactured
locally, since they are generally composed of highly resistive conductive materials to safely drain static discharges, without
increasing an electrocution risk in the event of an accident.
Anyone performing field maintenance on AMX equipment should use an appropriate ESD field service kit complete with at
least a dissipative work mat with a ground cord and a UL listed adjustable wrist strap with another ground cord.
WARNING: Do Not Open! Risk of Electrical Shock. Voltages in this equipment are
hazardous to life. No user-serviceable parts inside. Refer all servicing to qualified
service personnel.
Place the equipment near a main power supply outlet and make sure that you can
easily access the power breaker switch.
Avoid exposure to extreme heat and cold.
4
Instruction Manual - NXA-ENET8-POE+
EU COMPLIANCE INFORMATION:
Eligible to bear the CE mark; Conforms to European Union Low Voltage Directive 2014/35/EU; European Union EMC Directive
2004/108/EC; European Union Restriction of Hazardous Substances Recast (RoHS2) Directive 2011/65/EU; European Union
WEEE (recast) Directive 2012/19/EU; European Union Eco-Design Directive 2009/125/EC; European Union Registration,
Evaluation, Authorization and Restriction of Chemicals (REACH) Directive 2006/121/EC
You may obtain a free copy of the Declaration of Conformity by visiting http://www.amx.com/techcenter/certifications.asp.
WEEE NOTICE:
CHINA COMPLIANCE INFORMATION:
This appliance is labeled in accordance with European Directive 2012/19/EU concerning waste of electrical and electronic
equipment (WEEE). This label indicates that this product should not be disposed of with household waste. It should be
deposited at an appropriate facility to enable recovery and recycling.
This device is designed and evaluated under the condition of non-tropical climate; it can only be used in
locations in non-tropical climate areas. Using the device in tropical climate areas could result in a
potential safety hazard.
This device is designed and evaluated under the condition of altitude below 2000 meters above sea
level; it can only be used in locations below 2000 meters above sea level. Using the device above 2000
meters could result in a potential safety hazard.
Table o f Con te nts
5
Instruction Manual - NXA-ENET8-POE+
Table of Contents
Overview ..........................................................................................................16
NXA-ENET8-POE+ ........................................................................................................... 16
10/100/1000BASE-T RJ-45 Ports ....................................................................................................... 16
Port Status LEDs ................................................................................................................................... 16
Console Port ......................................................................................................................................... 16
Gigabit SFP Slots................................................................................................................................... 16
PoE Button ............................................................................................................................................ 16
System LEDs.......................................................................................................................................... 16
Factory Default Button.......................................................................................................................... 16
Cooling Fans and Vents ........................................................................................................................ 17
AC Power Socket................................................................................................................................... 17
Grounding Terminal.............................................................................................................................. 17
Hardware Specifications ............................................................................................... 17
Web Interface................................................................................................................. 18
Key Features ......................................................................................................................................... 18
Configuration Backup and Restore ....................................................................................................................................... 18
Authentication ....................................................................................................................................................................... 18
General Security Measures ................................................................................................................................................... 18
Access Control Lists .............................................................................................................................................................. 18
DHCP/DHCPv6 ....................................................................................................................................................................... 18
Port Configuration ................................................................................................................................................................. 18
Port Mirroring ........................................................................................................................................................................ 18
Port Trunking......................................................................................................................................................................... 18
Congestion Control................................................................................................................................................................ 18
Address Table........................................................................................................................................................................ 18
IP Version 4 and 6 ................................................................................................................................................................. 18
IEEE 802.1D Bridge ............................................................................................................................................................... 18
Store-and-Forward Switching ............................................................................................................................................... 18
Spanning Tree Algorithm ...................................................................................................................................................... 18
Virtual LANs ........................................................................................................................................................................... 18
Traffic Prioritization............................................................................................................................................................... 18
Qualify of Service................................................................................................................................................................... 18
Link Layer Discovery Protocol ............................................................................................................................................... 18
Multicast Filtering.................................................................................................................................................................. 18
Description of Software Features ......................................................................................................... 19
Configuration Backup and Restore..................................................................................................................... 19
Authentication .................................................................................................................................................... 19
Access Control Lists............................................................................................................................................ 19
Port Configuration .............................................................................................................................................. 19
Rate Limiting....................................................................................................................................................... 19
Port Mirroring ..................................................................................................................................................... 19
Port Trunking...................................................................................................................................................... 19
Storm Control ..................................................................................................................................................... 19
Static MAC Addresses......................................................................................................................................... 19
IP Address Filtering ............................................................................................................................................ 19
IEEE 802.1D Bridge............................................................................................................................................. 19
Store-and-Forward Switching ............................................................................................................................ 20
Spanning Tree Algorithm.................................................................................................................................... 20
Virtual LANs ........................................................................................................................................................ 20
Traffic Prioritization............................................................................................................................................ 20
Table o f Con te nts
6
Instruction Manual - NXA-ENET8-POE+
Quality of Service................................................................................................................................................ 20
Address Resolution Protocol .............................................................................................................................. 20
Multicast Filtering ............................................................................................................................................... 20
Link Layer Discovery Protocol ............................................................................................................................ 21
System Defaults.............................................................................................................. 21
Console Port Connection....................................................................................................................................................... 21
Authentication and Security Measures ................................................................................................................................. 21
Web Management.................................................................................................................................................................. 21
SNMP...................................................................................................................................................................................... 21
Port Configuration ................................................................................................................................................................. 21
Port Trunking......................................................................................................................................................................... 21
Congestion Control................................................................................................................................................................. 22
Address Table......................................................................................................................................................................... 22
Spanning Tree Algorithm ....................................................................................................................................................... 22
Virtual LANs ............................................................................................................................................................................ 22
Traffic Prioritization................................................................................................................................................................ 22
IP Settings .............................................................................................................................................................................. 22
System Log ............................................................................................................................................................................. 22
SMTP Email Alerts................................................................................................................................................................... 22
SNTP ....................................................................................................................................................................................... 22
Installation ......................................................................................................23
Package Contents............................................................................................................ 23
Optional Item ........................................................................................................................................ 23
Switch Installation Tasks ................................................................................................ 23
Unpack Package and Check Contents .................................................................................................. 23
Install the Chassis ................................................................................................................................ 23
Connect AC Power to Power On............................................................................................................ 24
Verify Switch Operation ........................................................................................................................ 24
Make Initial Configuration Changes..................................................................................................... 24
Through an RJ-45 Port ....................................................................................................................................... 24
Through the Console Port .................................................................................................................................. 25
Install Transceivers and Connect Cables............................................................................................. 25
Switch Chassis................................................................................................................. 25
General Installation Guidelines............................................................................................................ 25
Switch Cooling Requirements ......................................................................................... 26
Rack Cooling ....................................................................................................................................................... 26
How to Install the Switch in a Rack ...................................................................................................... 26
Rack-Mounting the Switch.................................................................................................................................. 27
Installing the Switch on a Shelf or Desktop........................................................................................................ 27
Power and Grounding...................................................................................................... 28
Switch Power Supply ............................................................................................................................ 28
Grounding the Chassis ......................................................................................................................... 28
Connecting to AC Power ....................................................................................................................... 28
Port Connections............................................................................................................. 29
Cable Labeling and Connection Records.............................................................................................. 29
Understanding the Port Status LEDs .................................................................................................... 29
Installing an SFP Transceiver ............................................................................................................... 29
Connecting to Twisted-Pair Copper Ports............................................................................................ 30
Copper Cabling Guidelines ................................................................................................................... 30
Table o f Con te nts
7
Instruction Manual - NXA-ENET8-POE+
10/100BASE-TX Pin Assignments ....................................................................................................... 31
1000BASE-T Assignments.................................................................................................................... 31
1000BASE-T Cable Requirements...................................................................................................................... 31
Power-over-Ethernet ............................................................................................................................ 32
Connecting to SFP Fiber Optic Ports..................................................................................................... 32
Switch Management ....................................................................................................... 34
Understanding the System Status LEDs ............................................................................................... 34
Connecting to the Console Port............................................................................................................ 34
Resetting the Switch............................................................................................................................. 36
Resetting to the Saved Configuration File.......................................................................................................... 36
Resetting to the Factory Default Settings........................................................................................................... 36
Using the Web Interface .................................................................................37
Overview ......................................................................................................................... 37
Connecting to the Web Interface ......................................................................................................... 37
Navigating the Web Browser Interface ................................................................................................ 37
Dashboard........................................................................................................................................................... 37
Home Page.......................................................................................................................................................... 38
Configuration Options ........................................................................................................................................ 38
Panel Display ...................................................................................................................................................... 38
Basic Management Tasks ................................................................................39
Overview .......................................................................................................................... 39
System Information......................................................................................................... 39
Hardware/Software Versions......................................................................................... 40
System Capabilities ........................................................................................................ 40
Configuring Support for Jumbo Frames ............................................................................................... 41
Usage Guidelines................................................................................................................................................ 41
Displaying Bridge Extension Capabilities ............................................................................................. 41
System Files.................................................................................................................... 42
Copying Files via FTP/TFTP or HTTP .................................................................................................... 42
Command Usage................................................................................................................................................. 42
Saving the Running Configuration to a Local File................................................................................. 43
Setting the Start-up File ....................................................................................................................... 44
Showing System Files ........................................................................................................................... 44
Automatic Operation Code Upgrade .................................................................................................... 45
Usage Guidelines................................................................................................................................................ 45
Setting the System Clock...................................................................................................................... 47
Setting the Time Manually .................................................................................................................... 47
Setting the SNTP Polling Interval ......................................................................................................... 48
Configuring NTP.................................................................................................................................... 49
Configuring Time Servers ..................................................................................................................... 49
Specifying SNTP Time Servers ........................................................................................................................... 49
Specifying NTP Time Servers.............................................................................................................................. 50
Specifying NTP Authentication Keys .................................................................................................................. 51
Setting the Time Zone........................................................................................................................... 52
Table o f Con te nts
8
Instruction Manual - NXA-ENET8-POE+
Configuring Summer Time.................................................................................................................... 52
Configuring the Console Port......................................................................................... 54
Configuring Telnet Settings ............................................................................................ 55
Displaying CPU Utilization ............................................................................................... 56
Configuring CPU Guard ................................................................................................... 56
Displaying Memory Utilization........................................................................................ 57
Resetting the System ...................................................................................................... 58
Command Usage................................................................................................................................... 58
Interface Configuration ..................................................................................61
Overview ......................................................................................................................... 61
Port Configuration.......................................................................................................... 61
Configuring by Port List ........................................................................................................................ 61
Command Usage................................................................................................................................................. 61
Configuring by Port Range ................................................................................................................... 62
Displaying Connection Status............................................................................................................... 63
Showing Port or Trunk Statistics .......................................................................................................... 63
Displaying Statistical History................................................................................................................ 66
Command Usage................................................................................................................................................. 66
Displaying Transceiver Data ................................................................................................................. 69
Configuring Transceiver Thresholds .................................................................................................... 69
Trunk Configuration ....................................................................................................... 71
Command Usage................................................................................................................................... 71
Configuring a Static Trunk.................................................................................................................... 71
Command Usage................................................................................................................................................. 71
Configuring a Dynamic Trunk ............................................................................................................... 73
Command Usage................................................................................................................................................. 73
Displaying LACP Port Counters............................................................................................................. 76
Displaying LACP Settings and Status for the Local Side....................................................................... 77
Displaying LACP Settings and Status for the Remote Side................................................................... 78
Configuring Load Balancing ................................................................................................................. 79
Command Usage................................................................................................................................................. 79
Saving Power.................................................................................................................. 80
Command Usage................................................................................................................................... 80
Configuring Local Port Mirroring.................................................................................... 81
Command Usage................................................................................................................................... 81
Configuring Remote Port Mirroring................................................................................. 82
Command Usage................................................................................................................................... 82
Configuration Guidelines.................................................................................................................................... 82
RSPAN Limitations .............................................................................................................................................. 82
Traffic Segmentation...................................................................................................... 84
Enabling Traffic Segmentation ............................................................................................................. 84
Configuring Uplink and Downlink Ports................................................................................................ 85
Command Usage................................................................................................................................................. 85
Table o f Con te nts
9
Instruction Manual - NXA-ENET8-POE+
VLAN Configuration .........................................................................................87
IEEE 802.1Q VLANs......................................................................................................... 87
Assigning Ports to VLANs ..................................................................................................................... 87
Configuring VLAN Groups..................................................................................................................... 88
Adding Static Members to VLANs ......................................................................................................... 89
Protocol VLANs ................................................................................................................ 92
Command Usage................................................................................................................................... 92
Configuring Protocol VLAN Groups ...................................................................................................... 92
Mapping Protocol Groups to Interfaces ............................................................................................... 93
Command Usage................................................................................................................................................. 93
Configuring MAC-based VLANs ...................................................................................... 94
Command Usage................................................................................................................................... 94
Address Table Settings ...................................................................................96
Configuring MAC Address Learning ................................................................................ 96
Command Usage................................................................................................................................... 96
Setting Static Addresses ................................................................................................ 97
Command Usage................................................................................................................................... 97
Changing the Aging Time ................................................................................................ 98
Displaying the Dynamic Address Table ........................................................................... 98
Clearing the Dynamic Address Table .............................................................................. 99
Issuing MAC Address Traps ......................................................................................... 100
Spanning Tree Algorithm ............................................................................. 101
Overview ....................................................................................................................... 101
Configuring Loopback Detection.................................................................................. 103
Configuring Global Settings for STA ............................................................................ 104
Command Usage................................................................................................................................. 104
Displaying Global Settings for STA............................................................................... 107
Configuring Interface Settings for STA........................................................................ 108
Displaying Interface Settings for STA .......................................................................... 111
Configuring Multiple Spanning Trees........................................................................... 113
Command Usage................................................................................................................................. 113
Configuring Interface Settings for MSTP ..................................................................... 115
Congestion Control ...................................................................................... 117
Rate Limiting................................................................................................................. 117
Storm Control ............................................................................................................... 118
Command Usage................................................................................................................................. 118
Class of Service ............................................................................................ 119
Layer 2 Queue Settings ................................................................................................ 119
Setting the Default Priority for Interfaces .......................................................................................... 119
Command Usage............................................................................................................................................... 119
Table o f Con te nts
10
Instruction Manual - NXA-ENET8-POE+
Selecting the Queue Mode.................................................................................................................. 120
Command Usage............................................................................................................................................... 120
Layer 3/4 Priority Settings........................................................................................... 121
Setting Priority Processing to DSCP or CoS ....................................................................................... 121
Command Usage............................................................................................................................................... 121
Mapping Ingress DSCP Values to Internal DSCP Values .................................................................... 122
Command Usage............................................................................................................................................... 122
Mapping CoS Priorities to Internal DSCP Values................................................................................ 123
Command Usage............................................................................................................................................... 123
Quality of Service ..........................................................................................125
Overview ....................................................................................................................... 125
Command Usage................................................................................................................................. 125
Configuring a Class Map............................................................................................... 125
Command Usage................................................................................................................................. 125
Creating QoS Policies ................................................................................................... 128
Attaching a Policy Map to a Port .................................................................................. 130
Command Usage................................................................................................................................. 130
VoIP Traffic Configuration ........................................................................... 131
Overview ....................................................................................................................... 131
Configuring VoIP Traffic............................................................................................... 131
Command Usage................................................................................................................................. 131
Configuring Telephony OUI.......................................................................................... 132
Configuring VoIP Traffic Ports ..................................................................................... 133
Command Usage................................................................................................................................. 133
Security Measures ........................................................................................ 134
AAA (Authentication, Authorization, and Accounting) ................................................ 134
Configuring Local/ Remote Logon Authentication............................................................................. 135
Command Usage............................................................................................................................................... 135
Configuring Remote Login Authentication Servers............................................................................ 135
Command Usage............................................................................................................................................... 136
Configuring AAA Accounting .............................................................................................................. 138
Command Usage............................................................................................................................................... 138
Configuring AAA Authorization .......................................................................................................... 142
Command Usage............................................................................................................................................... 142
Configuring User Accounts .......................................................................................... 144
Command Usage................................................................................................................................. 144
Network Access (MAC Address Authentication).......................................................... 145
Command Usage................................................................................................................................. 145
Configuring Global Settings for Network Access ............................................................................... 146
Configuring Network Access for Ports ............................................................................................... 147
Configuring a MAC Address Filter ...................................................................................................... 148
Command Usage............................................................................................................................................... 148
Displaying Secure MAC Address Information .................................................................................... 149
Table o f Con te nts
11
Instruction Manual - NXA-ENET8-POE+
Configuring HTTPS ....................................................................................................... 150
Configuring Global Settings for HTTPS .............................................................................................. 150
Command Usage............................................................................................................................................... 150
Replacing the Default Secure-site Certificate .................................................................................... 151
Configuring the Secure Shell ....................................................................................... 151
Command Usage................................................................................................................................. 152
Configuring the SSH Server ................................................................................................................ 153
Generating the Host Key Pair ............................................................................................................. 153
Importing User Public Keys................................................................................................................ 154
Access Control Lists ..................................................................................................... 156
Command Usage................................................................................................................................. 156
Showing TCAM Utilization................................................................................................................... 156
Command Usage............................................................................................................................................... 156
Setting the ACL Name and Type ......................................................................................................... 157
Configuring a Standard IPv4 ACL....................................................................................................... 158
Configuring an Extended IPv4 ACL .................................................................................................... 159
Configuring a Standard IPv6 ACL ....................................................................................................... 160
Configuring an Extended IPv6 ACL..................................................................................................... 161
Configuring a MAC ACL....................................................................................................................... 163
Configuring an ARP ACL...................................................................................................................... 164
Binding a Port to an Access Control List............................................................................................. 165
Showing ACL Hardware Counters ...................................................................................................... 166
ARP Inspection ............................................................................................................. 167
Command Usage................................................................................................................................. 167
Configuring Global Settings for ARP Inspection ................................................................................ 167
Command Usage............................................................................................................................................... 167
Configuring VLAN Settings for ARP Inspection .................................................................................. 168
Command Usage............................................................................................................................................... 168
Configuring Interface Settings for ARP Inspection............................................................................ 169
Displaying ARP Inspection Statistics.................................................................................................. 170
Displaying the ARP Inspection Log..................................................................................................... 170
Filtering IP Addresses for Management Access .......................................................... 171
Command Usage................................................................................................................................. 171
Configuring Port Security............................................................................................. 172
Command Usage................................................................................................................................. 172
Configuring 802.1x Port Authentication...................................................................... 173
Configuring 802.1x Global Settings ................................................................................................... 174
Configuring Port Authenticator Settings for 802.1x .......................................................................... 174
Command Usage............................................................................................................................................... 174
Displaying 802.1x Statistics ............................................................................................................... 176
DHCP Snooping............................................................................................................. 177
Command Usage................................................................................................................................. 177
DHCP Snooping Global Configuration ................................................................................................ 178
Table o f Con te nts
12
Instruction Manual - NXA-ENET8-POE+
DHCP Snooping VLAN Configuration .................................................................................................. 179
Command Usage............................................................................................................................................... 179
Configuring Ports for DHCP Snooping ................................................................................................ 180
Command Usage............................................................................................................................................... 180
Displaying DHCP Snooping Binding Information ............................................................................... 181
DoS Protection.............................................................................................................. 182
IPv4 Source Guard ....................................................................................................... 183
Configuring Ports for IPv4 Source Guard........................................................................................... 183
Command Usage............................................................................................................................................... 183
Configuring Static Bindings for IPv4 Source Guard........................................................................... 184
Command Usage............................................................................................................................................... 184
Displaying Information for Dynamic IPv4 Source Guard Bindings .................................................... 186
Basic Administration Protocols .................................................................... 187
Configuring Event Logging........................................................................................... 187
System Log Configuration .................................................................................................................. 187
Remote Log Configuration.................................................................................................................. 188
Sending Simple Mail Transfer Protocol Alerts.................................................................................... 189
Link Layer Discovery Protocol ...................................................................................... 190
Setting LLDP Timing Attributes........................................................................................................... 190
Configuring LLDP Interface Attributes ............................................................................................... 191
Configuring LLDP Interface Civic-Address ......................................................................................... 194
Command Usage............................................................................................................................................... 194
Displaying LLDP Local Device Information ......................................................................................... 195
Displaying LLDP Remote Device Information ..................................................................................... 197
Displaying Device Statistics ................................................................................................................ 202
Power over Ethernet..................................................................................................... 203
Setting the Switch's Overall PoE Power Budget ................................................................................. 204
Setting the Port PoE Power Budget .................................................................................................... 205
Command Usage............................................................................................................................................... 205
Simple Network Management Protocol........................................................................ 206
Command Usage................................................................................................................................. 207
Configuring Global Settings for SNMP................................................................................................ 207
Setting the Local Engine ID ................................................................................................................ 208
Command Usage............................................................................................................................................... 208
Specifying a Remote Engine ID........................................................................................................... 208
Command Usage............................................................................................................................................... 208
Setting SNMPv3 Views ........................................................................................................................ 209
Configuring SNMPv3 Groups .............................................................................................................. 211
Setting Community Access Strings .................................................................................................... 214
Configuring Local SNMPv3 Users ....................................................................................................... 215
Configuring Remote SNMPv3 Users ................................................................................................... 217
Command Usage............................................................................................................................................... 217
Specifying Trap Managers.................................................................................................................. 218
Command Usage............................................................................................................................................... 218
Table o f Con te nts
13
Instruction Manual - NXA-ENET8-POE+
Creating SNMP Notification Logs........................................................................................................ 221
Command Usage............................................................................................................................................... 221
Showing SNMP Statistics .................................................................................................................... 222
Remote Monitoring....................................................................................................... 223
Configuring RMON Alarms .................................................................................................................. 223
Command Usage............................................................................................................................................... 223
Configuring RMON Events................................................................................................................... 225
Command Usage............................................................................................................................................... 225
Configuring RMON History Samples ................................................................................................... 226
Command Usage............................................................................................................................................... 226
Configuring RMON Statistical Samples............................................................................................... 228
Command Usage............................................................................................................................................... 228
Setting a Time Range ................................................................................................... 229
Command Usage................................................................................................................................. 229
LBD Configuration ........................................................................................................ 231
Usage Guidelines ................................................................................................................................ 231
Configuring Global Settings for LBD ................................................................................................... 231
Configuring Interface Settings for LBD .............................................................................................. 232
Multicast Filtering .........................................................................................233
Overview ....................................................................................................................... 233
Layer 2 IGMP (Snooping and Query for IPv4).............................................................. 233
Configuring IGMP Snooping and Query Parameters.......................................................................... 234
Command Usage............................................................................................................................................... 234
Specifying Static Interfaces for a Multicast Router............................................................................ 236
Command Usage............................................................................................................................................... 236
Assigning Interfaces to Multicast Services ........................................................................................ 238
Command Usage............................................................................................................................................... 238
Setting IGMP Snooping Status per Interface..................................................................................... 239
Command Usage............................................................................................................................................... 239
Filtering IGMP Query Packets and Multicast Data.............................................................................. 242
Displaying Multicast Groups Discovered by IGMP Snooping ............................................................. 243
Command Usage............................................................................................................................................... 243
Displaying IGMP Snooping Statistics ................................................................................................. 243
Filtering and Throttling IGMP Groups .......................................................................... 246
Enabling IGMP Filtering and Throttling .............................................................................................. 246
Configuring IGMP Filter Profiles......................................................................................................... 246
Command Usage............................................................................................................................................... 246
Configuring IGMP Filtering and Throttling for Interfaces.................................................................. 248
Command Usage............................................................................................................................................... 248
MLD Snooping (Snooping and Query for IPv4) ............................................................ 249
Configuring MLD Snooping and Query Parameters............................................................................ 249
Setting Immediate Leave Status for MLD Snooping per Interface..................................................... 250
Specifying Static Interfaces for an IPv6 Multicast Router ................................................................. 250
Command Usage............................................................................................................................................... 250
Assigning Interfaces to IPv6 Multicast Services................................................................................ 252
Table o f Con te nts
14
Instruction Manual - NXA-ENET8-POE+
Command Usage............................................................................................................................................... 252
Showing MLD Snooping Groups and Source List................................................................................ 253
IP Tools .........................................................................................................254
Using the Ping Function ............................................................................................... 254
Command Usage................................................................................................................................. 254
Using the Trace Route Function ................................................................................... 255
Command Usage................................................................................................................................. 255
Address Resolution Protocol........................................................................................ 256
Displaying Dynamic or Local ARP Entries ........................................................................................... 256
IP Services ....................................................................................................257
Domain Name Service................................................................................................... 257
Configuring General DNS Service Parameters ................................................................................... 257
Command Usage............................................................................................................................................... 257
Configuring a List of Domain Names .................................................................................................. 257
Command Usage............................................................................................................................................... 257
Configuring a List of Name Servers .................................................................................................... 258
Command Usage............................................................................................................................................... 258
Configuring Static DNS Host to Address Entries ................................................................................ 259
Command Usage............................................................................................................................................... 259
Displaying the DNS Cache................................................................................................................... 260
Command Usage............................................................................................................................................... 260
Dynamic Host Configuration Protocol.......................................................................... 260
Specifying a DHCP Client Identifier .................................................................................................... 260
Command Usage............................................................................................................................................... 260
Configuring DHCP Relay Service......................................................................................................... 261
Command Usage............................................................................................................................................... 262
Enabling DHCP Dynamic Provision ..................................................................................................... 263
Command Usage............................................................................................................................................... 263
IP Configuration ............................................................................................265
Setting the Switch's IP Address (IP Version 4) ........................................................... 265
Configuring the IPv4 Default Gateway ............................................................................................... 265
Configuring IPv4 Interface Settings .................................................................................................. 265
Setting the Switch's IP Address (IP Version 6) ........................................................... 267
Command Usage............................................................................................................................................... 267
Configuring the IPv6 Default Gateway ............................................................................................... 267
Configuring IPv6 Interface Settings .................................................................................................. 268
Command Usage............................................................................................................................................... 268
Configuring an IPv6 Address.............................................................................................................. 270
Command Usage............................................................................................................................................... 270
Showing IPv6 Addresses .................................................................................................................... 272
Showing the IPv6 Neighbor Cache..................................................................................................... 273
Showing IPv6 Statistics ...................................................................................................................... 274
Command Usage............................................................................................................................................... 274
Showing the MTU for Responding Destinations ................................................................................. 277
Table o f Con te nts
15
Instruction Manual - NXA-ENET8-POE+
Appendix A: Software Specifications ............................................................278
Software Features ........................................................................................................ 278
Management Authentication .............................................................................................................. 278
General Security Measures................................................................................................................. 278
Port Configuration .............................................................................................................................. 278
Flow Control........................................................................................................................................ 278
Storm Control ..................................................................................................................................... 278
Port Mirroring ..................................................................................................................................... 278
Rate Limits .......................................................................................................................................... 278
Port Trunking ...................................................................................................................................... 278
Spanning Tree Algorithm.................................................................................................................... 278
VLAN Support...................................................................................................................................... 278
Class of Service................................................................................................................................... 278
Quality of Service ................................................................................................................................ 278
Multicast Filtering ............................................................................................................................... 278
IP Routing ........................................................................................................................................... 278
Additional Features ............................................................................................................................ 278
Management Features.................................................................................................. 279
In-Band Management ......................................................................................................................... 279
Out-of-Band Management .................................................................................................................. 279
Software Loading................................................................................................................................ 279
SNMP................................................................................................................................................................. 279
RMON ................................................................................................................................................................ 279
Standards ..................................................................................................................... 279
Management Information Bases.................................................................................. 279
Appendix B: Troubleshooting .......................................................................281
Diagnosing LED Indicators ........................................................................................... 281
System Self-Diagnostic Test Failure............................................................................. 281
Power and Cooling Problems ....................................................................................... 281
Installation ................................................................................................................... 281
In-Band Access ............................................................................................................ 281
Problems Accessing the Management Interface ......................................................... 282
Using System Logs ....................................................................................................... 282
Overview
16
Instruction Manual - NXA-ENET8-POE+
Overview
NXA-ENET8-POE+
The NXA-ENET8-POE+ (FG2178-64) is a Gigabit Ethernet switch with 8 10/100/1000BASE-T ports, and two Small Form Factor
Pluggable (SFP) transceiver slots for fiber connectivity. The switch includes an SNMP-based management agent, which provides
both in-band and out-of-band access for managing the switch. Further, the switches support both web and CLI-based
configuration.
All of the 10/100/1000 Mbps ports on the NXA-ENET-POE+ support both the IEEE 802.3af-2003 and IEEE 802.3at-2009 PoE
standards. The switch is an excellent choice for supplying power to connected PoE devices such as web cameras, IP telephones, or
access points.
The switch consists of several key hardware components. This manual describes each specific component, or related components,
together with their installation requirements and procedures in each chapter. To understand each component in detail, refer to the
relevant section.
10/100/1000BASE-T RJ-45 Ports
The switch contains 8 10/100/1000BASE-T RJ-45 ports that support 10/100/ 1000BASE-T copper links to other devices. For
more information, see the Connecting to Twisted-Pair Copper Ports section on page 30.
Port Status LEDs
For information on port status LED indicators, see the Understanding the Port Status LEDs section on page 29.
Console Port
The RJ-45 connector on the front panel right side that is labeled "Console" provides an out-of-band serial connection to a terminal
or a PC running terminal emulation software. The port can be used for performing switch monitoring and configuration. For more
information, see the Connecting to the Console Port section on page 34.
Gigabit SFP Slots
The switches contain up to four SFP transceiver slots that operate up to 1 Gbps full duplex. For more information, see the
Connecting to SFP Fiber Optic Ports section on page 32.
PoE Button
Pressing the PoE button on the front panel changes the port LEDs to display PoE status. For more information, see the
Understanding the System Status LEDs section on page 34.
System LEDs
For information on system status LED indicators, see the Understanding the System Status LEDs section on page 34.
Factory Default Button
Pressing the reset button on the front panel causes the switch to restart or restore factory default settings. For more information,
see the Resetting the Switch section on page 36.
FIG. 1
NXA-ENET-POE+ (front and rear panels)
Overview
17
Instruction Manual - NXA-ENET8-POE+
Cooling Fans and Vents
The switch must be installed in a properly cooled and ventilated environment. For more information, see the Rack Cooling section
on page 26.
AC Power Socket
The switch requires a 100-240 VAC, 50-60 Hz AC power source. For more information on the switch power input, how to connect
it, and how to power-on the switch, see the Connecting to AC Power section on page 28.
Grounding Terminal
The switch includes a grounding terminal that must be connected to a ground source that provides local earth potential. For more
information, see the Grounding the Chassis section on page 28.
Hardware Specif ications
NXA-ENET8-POE+ Hardware Specifications
Ports 8 1000BASE-T RJ-45 ports with Auto-negotiation, 2 Gigabit SFP transceiver slots
Network Interface Ports 1-8: RJ-45 connector, auto MDI/X
Ports 9-10: Gigabit SFP transceivers Packet Buffer Size: 1 MB
Buffer Architecture 4 Mbytes
Aggregate Bandwidth 104 Gbps
Switching Database 8K MAC address entries
AC Input Power AC 100-240 V, 50-60 Hz, 2.1 A
Power Consumption 160W
Weight 2.4kg (5.34lb)
Size 33.0 x 20.4 x 4.26 cm (12.99 x 8.03 x 1.67 in.)
Temperature Operating: 0° C to 40° C (32° F to 104° F)
Storage: -40° C to 70° C (-40° F to 158° F)
Humidity Operating: 10% to 90% (non-condensing)
Out-of-Band Management Front panel RJ-45 console port
In-Band Management SSH, Telnet, SNMP, or HTTP
Software Loading HTTP, FTP/TFTP in-band
Forwarding Mode Store-and-forward
Throughput Wire speed
Flow Control Full Duplex: IEEE 802.3x
Half Duplex: Back pressure
Overview
18
Instruction Manual - NXA-ENET8-POE+
Web Interface
The NXA-ENET8-POE+ provides a broad range of features for Layer 2 switching and Layer 3 routing. It includes a management
agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features
provided by this switch. However, there are many options that you should configure to maximize the switch's performance for your
particular network environment.
Key Features
The NXA-ENET8-POE+ provides a wide range of advanced performance enhancing features, as described below:.
NXA-ENET8-POE+ Key Features
Conf iguration Backup
and Restore
Using management station or TFTP server
Authentication Console, Telnet, web - user name/password, RADIUS, TACACS+
Port - IEEE 802.1X, MAC address filtering
SNMP v1/2c - Community strings
SNMP version 3 - MD5 or SHA password Telnet - SSH
•Web - HTTPS
General Security
Measures
•AAA
ARP Inspection
DHCP Snooping (with Option 82 relay information)
•DoS Protection
IP Source Guard
Port Authentication - IEEE 802.1X
Port Security - MAC address filtering
Access Control Lists Supports up to 256 ACLs, 128 rules per ACL, and 512 rules per system
DHCP/DHCPv6 Client, Relay, Relay Option 82
Port Conf iguration Speed, duplex mode, and flow control
Port Mirroring 3 sessions, one or more source ports to an analysis port
Port Trunking Supports up to 8 trunks - static or dynamic trunking (LACP)
Congestion Control •Rate Limiting
Throttling for broadcast, multicast, unknown unicast storms
Address Table 8K MAC addresses in the forwarding table (shared with L2 unicast, L2 multicast, IPv4 multicast, IPv6
multicast)
1K static MAC addresses
512 L2 IPv4 multicast groups (shared with MAC address table)
IP Version 4 and 6 Supports IPv4 and IPv6 addressing and management
IEEE 802.1D Bridge Supports dynamic data switching and addresses learning
Store-and-Forward
Switching
Supported to ensure wire-speed switching while eliminating bad frames
Spanning Tree
Algorithm
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Trees (MSTP)
Virtual LANs Up to 4094 using IEEE 802.1Q, port-based, protocol-based, voice VLANs, and QinQ tunnel
Traffic Prioritization Default port priority, traffic class map, queue scheduling, IP Precedence, or Differentiated Services Code Point
(DSCP)
Qualify of Service Supports Differentiated Services (DiffServ)
Link Layer Discovery
Protocol
Used to discover basic information about neighboring devices
Multicast Filtering Supports IGMP snooping and query for Layer 2
Overview
19
Instruction Manual - NXA-ENET8-POE+
Description of Software Features
The switch provides a wide range of advanced performance enhancing features. Flow control eliminates the loss of packets due to
bottlenecks caused by port saturation. Storm suppression prevents broadcast, multicast, and unknown unicast traffic storms from
engulfing the network. Untagged (port-based), tagged, and protocol-based VLANs, plus support for automatic GVRP VLAN
registration provide traffic security and efficient use of network bandwidth. CoS priority queueing ensures the minimum delay for
moving real-time multimedia data across the network. While multicast filtering provides support for real-time network applications.
Some of the management features are briefly described below.
Conf iguration Backup and Restore
You can save the current configuration settings to a file on the management station (using the web interface) or an TFTP server
(using the web or console interface), and later download this file to restore the switch configuration settings.
Authentication
This switch authenticates management access via the console port, Telnet, or a web browser. User names and passwords can be
configured locally or can be verified via a remote authentication server (i.e., RADIUS or TACACS+). Port-based authentication is
also supported via the IEEE 802.1X protocol. This protocol uses Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then uses the EAP between the switch and the authentication server to verify the
client's right to access the network via an authentication server (i.e., RADIUS or TACACS+ server).
Other authentication options include HTTPS for secure management access via the web, SSH for secure management access over
a Telnet-equivalent connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web management access. MAC address
filtering and IP source guard also provide authenticated port access. While DHCP snooping is provided to prevent malicious attacks
from insecure ports.
Access Control Lists
ACLs provide packet filtering for IP frames (based on address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can be used to improve performance by blocking unnecessary network traffic or to
implement security controls by restricting access to specific network resources or protocols.
Port Configuration
You can manually configure the speed, duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the
connection settings used by the attached device. Use full-duplex mode on ports whenever possible to double the throughput of
switch connections. Flow control should also be enabled to control network traffic during periods of congestion and prevent the
loss of packets when port buffer thresholds are exceeded. The switch supports flow control based on the IEEE 802.3x standard
(now incorporated in IEEE 802.3-2002).
Rate Limiting
This feature controls the maximum rate for traffic transmitted or received on an interface. Rate limiting is conf igured on interfaces
at the edge of a network to limit traffic into or out of the network. Packets that exceed the acceptable amount of traffic are
dropped.
Port Mirroring
The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach a protocol analyzer or RMON
probe to this port to perform traffic analysis and verify connection integrity.
Port Trunking
Ports can be combined into an aggregate connection. Trunks can be manually set up or dynamically configured using Link
Aggregation Control Protocol (LACP - IEEE 802.3-2005). The additional ports dramatically increase the throughput across any
connection, and provide redundancy by taking over the load if a port in the trunk should fail. The switch supports up to 8 trunks.
Storm Control
Broadcast, multicast and unknown unicast storm suppression prevents traffic from overwhelming the network.When enabled on a
port, the level of traffic passing through the port is restricted. If traffic rises above a pre-defined threshold, it will be throttled until
the level falls back beneath the threshold.
Static MAC Addresses
A static address can be assigned to a specific interface on this switch. Static addresses are bound to the assigned interface and will
not be moved. When a static address is seen on another interface, the address will be ignored and will not be written to the address
table. Static addresses can be used to provide network security by restricting access for a known host to a specific port.
IP Address Filtering
Access to insecure ports can be controlled using DHCP Snooping which filters ingress traffic based on static IP addresses and
addresses stored in the DHCP Snooping table. Traffic can also be restricted to specific source IP addresses or source IP/MAC
address pairs based on static entries or entries stored in the DHCP Snooping table.
IEEE 802.1D Bridge
The switch supports IEEE 802.1D transparent bridging. The address table facilitates data switching by learning addresses, and then
filtering or forwarding traffic based on this information. The address table supports up to 16K addresses.
Overview
20
Instruction Manual - NXA-ENET8-POE+
Store-and-Forward Switching
The switch copies each frame into its memory before forwarding them to another port. This ensures that all frames are a standard
Ethernet size and have been verified for accuracy with the cyclic redundancy check (CRC). This prevents bad frames from entering
the network and wasting bandwidth.
To avoid dropping frames on congested ports, the switch provides 12 Mbits for frame buffering. This buffer can queue packets
awaiting transmission on congested networks.
Spanning Tree Algorithm
The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) - This protocol provides loop detection. When there are multiple physical paths
between segments, this protocol will choose a single path and disable all others to ensure that only one route exists
between any two stations on the network. This prevents the creation of network loops. However, if the chosen path should
fail for any reason, an alternate path will be activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) - This protocol reduces the convergence time for network topology
changes to about 3 to 5 seconds, compared to 30 seconds or more for the older IEEE 802.1D STP standard. It is intended
as a complete replacement for STP, but can still interoperate with switches running the older standard by automatically
reconfiguring ports to STP-compliant mode if they detect STP protocol messages from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) - This protocol is a direct extension of RSTP. It can provide an
independent spanning tree for different VLANs. It simplifies network management, provides for even faster convergence
than RSTP by limiting the size of each region, and prevents VLAN members from being segmented from the rest of the
group (as sometimes occurs with IEEE 802.1D STP).
Virtual LANs
The switch supports up to 4094 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domain
regardless of their physical location or connection point in the network. The switch supports tagged VLANs based on the IEEE
802.1Q standard. Members of VLAN groups can be dynamically learned via GVRP, or ports can be manually assigned to a specific
set of VLANs. This allows the switch to restrict traffic to the VLAN groups to which a user has been assigned. By segmenting your
network into VLANs, you can:
Eliminate broadcast storms which severely degrade performance in a flat network.
Simplify network management for node changes/moves by remotely configuring VLAN membership for any port, rather
than having to manually change the network connection.
Provide data security by restricting all traffic to the originating VLAN, except where a connection is explicitly defined via the
switch's routing service.
Use private VLANs to restrict traffic to pass only between data ports and the uplink ports, thereby isolating adjacent ports
within the same VLAN, and allowing you to limit the total number of VLANs that need to be configured.
Use protocol VLANs to restrict traffic to specified interfaces based on protocol type.
Traff ic Prioritization
This switch prioritizes each packet based on the required level of service, using eight priority queues with strict priority, Weighted
Round Robin (WRR) scheduling, or a combination of strict and weighted queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize
incoming traffic based on input from the end-station application. These functions can be used to provide independent priorities for
delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4 traffic to meet application requirements. Traffic can be
prioritized based on the priority bits in the IP frame's Type of Service (ToS) octet using DSCP, or IP Precedence. When these
services are enabled, the priorities are mapped to a Class of Service value by the switch, and the traffic then sent to the
corresponding output queue.
Quality of Service
Differentiated Services (DiffServ) provides policy-based management mechanisms used for prioritizing network resources to meet
the requirements of specific traffic types on a per-hop basis. Each packet is classified upon entry into the network based on access
lists, IP Precedence or DSCP values, or VLAN lists. Using access lists allows you select traffic based on Layer 2, Layer 3, or Layer 4
information contained in each packet. Based on network policies, different kinds of traffic can be marked for different kinds of
forwarding.
Address Resolution Protocol
The switch uses ARP to convert between IP addresses and MAC (hardware) addresses. This switch supports conventional ARP,
which locates the MAC address corresponding to a given IP address. This allows the switch to use IP addresses for routing
decisions and the corresponding MAC addresses to forward packets from one hop to the next.
Multicast Filtering
Specific multicast traffic can be assigned to its own VLAN to ensure that it does not interfere with normal network traffic and to
guarantee real-time delivery by setting the required priority level for the designated VLAN. The switch uses IGMP Snooping and
Query for IPv4,and MLD Snooping and Query for IPv6 to manage multicast group registration.
/